Overview of Online Security

Staying secure online is something everyone needs to pay attention to. The saying “you’re only as strong as your weakest link” is true when it comes to online security. An out of date browser or operating system, a compromised login or insecure connection can leave you vulnerable and everyone else around you!

Your business or organization’s online security depends a lot on putting preventative measures in place to mitigate or minimize risks and planning for the worst case scenario if you have a breach. This is of course easier said than done and you are probably wondering how to get started.

Below find a brief overview of some of the common methods utilized by attackers along with some suggestions on where you should start. At the bottom of the page you’ll find a link to a previous presentation as well as an Online Security Primer document on this topic with some key takeaways that you can start today on securing your online presence.

What are common methods utilized by attackers?

  • Malware/Ransomware/Viruses
  • Phishing/Social Engineering
  • Compromised/Stolen Devices
  • Compromised/Stolen Credentials
  • Distributed Denial of Service (DDoS)
  • SQL Injections
  • Cross-Site Scripting (XSS)
  • Session Hijacking
  • Man in the Middle Attack

Where to start? Assess, Prevent and Prepare!

  • Assess: Know Thy Resources
    • Inventory Internal and External Systems
    • Who Has Access and When Was Access Updated
    • Website Registrar, Hosting and Other Systems
    • Contingency and Redundancy Plans
  • Prevent: Update, Firewall and Scan
    • Keep All Systems Up To Date
      • This include Hosting Server Software and Website Software (NOT THE SAME!)
    • Have Firewalls and Other Security (i.e. WAF)
    • Virus and Malware Scan, Regularly!
  • Prepare: Backup and Monitor
    • Prepare Assuming You Will Be Breached
    • Backup Off Site Regularly
    • Continuous Monitoring

Get a high level, broad stroke view of some of the more common forms of attack in layman’s terms and what you and your business or organization can do to mitigate, or put yourself in the best position to recover from, a breach.

This 30 minute webinar is a great primer for any knowledge level and the PDF of the PowerPoint presentation gives some great takeaways to help assess, protect and prepare when it comes to online security.

©2019 Developer Squad. All rights reserved.

About Us | FAQ | Free Tools | Blog | Partner with Us | Contact

How We Scan and Remove Malware

You will be given secure access to our portal where you enter the FTP credentials to the main directory of your site (typically the public_html). Our scanners will then do a deep scan of all files. Once found, you can request a cleaning (if purchased) and we will immediately begin the cleaning process.

We start as soon as you set things up and the length of time it takes to scan and remove malware will vary depending on the level of infection and number of files. Typically it takes several hours. Our portal updates you on progress and has 24x7x365 chat support so you are never left alone!

US Based Family Business  •  Money Back Guarantee

US Based Family Business

Cousins Jon and Mike Brennan (bios here) were always close like brothers and so, many years ago, they decided to start a business together. It wasn’t long before Jon’s brother Jeff and their mother Judy (the first programmer in the family!) joined the company. We’ve never looked back!

We pride ourselves on our fanatical customer service and would welcome the opportunity to earn your trust.

Who's Developer Squad?

A quick message from one of our founders.

Thanks for stopping bye! Please hit us up in chat with any questions.

Have Questions?

Give us a shout via chat, phone or email.

Researching Options?

Get FREE professional advice and information from a member of our squad.

We can help you navigate your next steps,
even if it isn’t with us today.

Log in with your credentials

Forgot your details?